Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

JK0-019 Questions and Answers

Note! Following JK0-019 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

JK0-019 Questions and Answers

Question # 6

Which of the following supports faster wireless broadband speeds?

A.

Satellite

B.

Wi-MAX

C.

ISDN

D.

OC-3

Full Access
Question # 7

In a newly installed LAN, the network administrator receives many calls about intermittent or slow connectivity to the authentication server. Which of the following could cause this problem? (Select TWO).

A.

VLAN configuration error

B.

Cables too short

C.

Cable crosstalk

D.

Incorrect channel

E.

EMI

F.

Wrong subnet mask

Full Access
Question # 8

An IP camera has a failed PoE NIC. This is the third time in months that a PoE NIC has failed on this device. The technician suspects a possible power issue. Which of the following should be used to test the theory?

A.

Toner probe

B.

Loopback plug

C.

Protocol analyzer

D.

Multimeter

Full Access
Question # 9

Which of the following properties of DHCP would a technician use to ensure an IP address is not leased out from the active scope?

A.

Reservations

B.

Lease times

C.

Removing IPs from the active leases

D.

Configuring the DNS options

Full Access
Question # 10

Which of the following is the unit used to transfer information at Layer 2 of the OSI model?

A.

Packet

B.

Socket

C.

Session

D.

Frame

Full Access
Question # 11

Which of the following is the default authentication method for a Windows client using PPP over a dialup connection?

A.

TACACS+

B.

WINS

C.

Kerberos

D.

MS-CHAP

Full Access
Question # 12

Which of the following network appliances will only detect and not prevent malicious network activity?

A.

IDS

B.

Network sniffer

C.

IPS

D.

Firewall

Full Access
Question # 13

A security appliance is blocking a DDoS attack on the network. Which of the following logs would be used to troubleshoot the traffic patterns trying to go across the network?

A.

IPS logs

B.

Application logs

C.

IDS logs

D.

History logs

Full Access
Question # 14

Which of the following wireless router security measures provides access to a network by allowing only devices on an approved physical address list?

A.

Port filtering

B.

MAC filtering

C.

SSID masking

D.

Port forwarding

Full Access
Question # 15

An administrator needs to provide remote connectivity to server1, web traffic to server2, and FTP access to server3 using a single outside IP address. Which of the following would the administrator implement on the firewall to accomplish this?

A.

Port Address Translation

B.

Demilitarized Zone

C.

Stateful Packet Inspection

D.

Network Address Translation

Full Access
Question # 16

Which of the following performs authentication and provides a secure connection by using 3DES to encrypt all information between two systems?

A.

HTTPS

B.

SSH

C.

RSA

D.

SSL

Full Access
Question # 17

Which of the following can be used to compromise a WPA encrypted wireless network when the rainbow table does not contain the key?

A.

Evil twin

B.

War chalking

C.

Buffer overflow

D.

Virus

Full Access
Question # 18

Which of the following allows a malicious attacker to view network traffic if the attacker is on the same network segment as Joe, an administrator?

A.

DoS attack

B.

Man-in-the-middle attack

C.

Smurf attack

D.

Xmas attack

Full Access
Question # 19

A technician has configured a router to authenticate VPN users to an LDAP server on the network. In order to allow the authentication service, both UDP and TCP ports needed to be allowed on the router. Which of the following services was MOST likely used?

A.

Kerberos

B.

TACACS+

C.

RADIUS

D.

802.1x

Full Access
Question # 20

Which of the following security appliances are used to only identify traffic on individual systems?

A.

Host based IPS

B.

Application based IPS

C.

Network based IDS

D.

Host based IDS

Full Access
Question # 21

Which of the following security methods is used to attract users attempting to gain unauthorized access to various systems within a single network?

A.

Network based IDS

B.

Firewall

C.

Network based IPS

D.

Honeynet

Full Access
Question # 22

A company is experiencing a denial of service attack and wants to identify the source IP address of the attacker in real time. Which method is the BEST way to accomplish this?

A.

Network sniffer

B.

Syslog

C.

SNMPv3

D.

System logs

Full Access
Question # 23

Which of the following are authentication methods that can use AAA authentication? (Select TWO).

A.

Kerberos

B.

PKI

C.

TKIP/AES

D.

MS-CHAP

E.

RADIUS

F.

TACACS+

Full Access
Question # 24

Which of the following would allow a network administrator to implement a user authentication method that uses X.509 certificates?

A.

PKI

B.

Kerberos

C.

TACACS+

D.

RADIUS

Full Access
Question # 25

The company is setting up a new website that will be requiring a lot of interaction with external users. The website needs to be accessible both externally and internally but without allowing access to internal resources. Which of the following would MOST likely be configured on the firewall?

A.

PAT

B.

DHCP

C.

DMZ

D.

NAT

Full Access
Question # 26

A server administrator, Ann, is deploying a server that she wants to mitigate intrusions from zero day exploits. Which of the following should be deployed?

A.

Behavior based IPS

B.

Signature based IDS

C.

Antivirus software

D.

Access Control Lists

Full Access
Question # 27

At which of the following layers do IP addresses exist?

A.

TCP/IP model Internet layer

B.

OSI model Data Link layer

C.

TCP/IP model Transport layer

D.

OSI model Physical layer

Full Access
Question # 28

Which of the following is the only standard that can operate at either frequency?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 29

A network administrator is performing a penetration test on the WPA2 wireless network. Which of the following can be used to find the key?

A.

DoS

B.

Buffer overflow

C.

Dictionary file

D.

SQL injection

Full Access
Question # 30

Which of the following cables would BEST be used to extend a network through an 80 feet (262 meters) machine shop that has many high voltage machines and generators running?

A.

CAT5

B.

CAT6

C.

Coaxial

D.

Fiber

Full Access
Question # 31

Which of the following is MOST likely used with RG-6 media?

A.

MTRJ

B.

RJ-11

C.

RJ-45

D.

F-connector

Full Access
Question # 32

Which of the following wireless standards can transmit data up to 540Mbps?

A.

802.11a

B.

802.11b

C.

802.11g

D.

802.11n

Full Access
Question # 33

A user’s computer is unable to access the Internet. Which of the following utilities can a technician use to determine if DNS is working?

A.

nbstat

B.

arp

C.

nslookup

D.

ipconfig

Full Access
Question # 34

Which of the following network protocols is used for a secure command line interface for management of network devices?

A.

SSH

B.

TELNET

C.

IGMP

D.

HTTP

Full Access
Question # 35

Which of the following is the MAXIMUM rated speed for CAT5 cabling?

A.

10Mbps

B.

100Mbps

C.

1000Mbps

D.

10Gbps

Full Access
Question # 36

Which of the following connectors is used for coaxial copper cable?

A.

BNC

B.

DB-9

C.

RJ-11

D.

ST

Full Access
Question # 37

Which of the following cable types use pins 1 and 2 to transmit and 3 and 6 to receive?

A.

Coaxial

B.

Crossover

C.

Multimode fiber

D.

Straight-though

Full Access
Question # 38

Which of the following are standard fiber cable connector types? (Select TWO).

A.

RJ-11

B.

F-connector

C.

MTRJ

D.

DB-9

E.

ST

Full Access
Question # 39

Which of the following types of technologies should be used to provide a MAXIMUM 10 GB speed to a multi-mode fiber network?

A.

10GBaseER

B.

10GBaseSR

C.

10GBaseTX

D.

10GBaseT

Full Access
Question # 40

A user does not have network connectivity. While testing the cable the technician receives the below reading on the cable tester:

1-----------1

2-----------2

3-----------3

4-----------4

5-----------5

6-----------6

7-----------7

8-----------8

Which of the following should the technician do NEXT?

A.

Cable is a crossover, continue troubleshooting

B.

Pin 3 is not used for data, continue troubleshooting

C.

Pin 3 is not used for data, replace the NIC

D.

Redo the cable’s connectors

Full Access
Question # 41

Which of the following tools allows an administrator to identify a cable?

A.

Multimeter

B.

Cable stripper

C.

Toner

D.

Punch down tool

Full Access
Question # 42

A network technician is assigned to view websites that a user has visited. Which of the following should the technician review to find this information?

A.

Event viewer

B.

History logs

C.

Network sniffer

D.

System logs

Full Access
Question # 43

Which of the following is the radio frequency and data rate for 802.11g as specified by the IEEE standards?

A.

2.0 GHz at 33 Mbps

B.

2.4 GHz at 54 Mbps

C.

2.4 GHz at 128 Mbps

D.

5.0 GHz at 54 Mbps

Full Access
Question # 44

It has been suspected that one of the users is using the network inappropriately. As a preventive measure HR has authorized the IT department to enable port mirroring on the user’s network port. Which of the following devices would be used to monitor the network activity?

A.

Port analyzer

B.

Multimeter

C.

Network sniffer

D.

Cable certifier

Full Access
Question # 45

Which of the following defines a rack located in an office building between the main rack and other office equipment?

A.

DSU

B.

MDF

C.

CSU

D.

IDF

Full Access
Question # 46

Which of the following connector types would be found with a VoIP system utilizing CAT6 cabling?

A.

SC

B.

RJ-45

C.

RJ-11

D.

BNC

Full Access
Question # 47

A user reports that several spots within the company’s office have intermittent connectivity issues with the newly installed wireless network. There are several WAPs located around the office to provide a strong signal wherever the users are. Which of the following is the MOST likely cause of the problem?

A.

Incompatible network card

B.

Channel overlap

C.

Latency

D.

WEP encryption

Full Access
Question # 48

Which of the following wireless parameters may need to be modified when a new cordless telephone is installed?

A.

Encryption type

B.

SSID

C.

IP address

D.

Channel

Full Access
Question # 49

A technician has set up a wired network IP scheme with the following specifications:

DHCP: 192.168.1.100-150

Gateway: 192.168.1.1

DNS: 192.168.1.1

Which of the following is represented by this addressing scheme?

A.

Static

B.

QoS

C.

Dynamic

D.

Dynamic with static reservation

Full Access
Question # 50

A network administrator has just been notified about the loss of Internet connectivity. Another technician had just performed non-scheduled maintenance and mentioned that some cabling may have been moved. Which of the following MOST likely caused the loss of Internet connectivity?

A.

Broadcast storm

B.

TX/RX cables reversed

C.

Mismatched MTU

D.

Incorrect routing table

Full Access
Question # 51

A technician is implementing a wireless network at a small business. The business already has a certificate authority and RADIUS server that they would like the technician to integrate with the wireless network. Additionally, the business would like to utilize their legacy 802.11b TKIP printers. Which of the following configurations should the technician use?

A.

802.11a with WPA2-Enterprise

B.

802.11n with WPA-PSK

C.

802.11n with WPA2-PSK

D.

802.11g with WPA-Enterprise

Full Access
Question # 52

A user informs the network administrator of increasingly common wireless connection problems. The administrator determines the user has recently received a new cordless phone. The phone is MOST likely causing which of the following conditions?

A.

Signal strength latency

B.

Bouncing signal

C.

Interference

D.

Crosstalk

Full Access
Question # 53

When a packet that is entering a switch port is encapsulated, which of the following is the switch performing?

A.

802.1q

B.

Collision avoidance

C.

Port mirroring

D.

STP

Full Access
Question # 54

Users at a remote site are unable to establish a VPN to the main office. At which of the following layers of the OSI model does the problem MOST likely reside?

A.

Presentation

B.

Application

C.

Physical

D.

Session

Full Access
Question # 55

A technician is troubleshooting a network camera. The technician restarted the modem and now the camera is no longer available from a mobile device. Which of the following has MOST likely occurred?

A.

The public IP address of the network has changed.

B.

The camera has received a new firmware update.

C.

The camera’s secure shell has been disabled.

D.

The router has changed the IP of the mobile device.

Full Access
Question # 56

Joe, a network technician, is asked to install a couple new WAP’s inside a back warehouse that was added to a main warehouse facility that already has complete wireless coverage on both the 2.4GHz and 5GHz frequencies. Joe already has a complete wireless heat map of the main warehouse. Which of the following is the first step that Joe should do before choosing which WAP’s to use?

A.

Conduct a wireless survey of the back warehouse.

B.

Ask the vendor that provided the WAP’s for the main warehouse for recommendations.

C.

Ask the systems administrator which WAP’s are preferred.

D.

Only order WAP’s that support 5GHz channels.

Full Access
Question # 57

A network administrator is replacing old switches to support a VoIP deployment. Based on this parameter, which of the following is MOST likely to be implemented on these new switches?

A.

PoE

B.

STP

C.

NAT

D.

VTP

Full Access
Question # 58

A user is trying to connect to the wireless network in the office but is unable to establish a consistent connection. The computer alternates connecting between several similarly configured access points. Which of the following would be the BEST way to address this issues?

A.

Adjust the signal strength of the access points with minimal coverage overlap.

B.

Increase the pool in each of the access points to avoid running out of IPs.

C.

Configure each access point to use a different method of encryption than the others.

D.

Reconfigure each of the access points so that they broadcast different SSIDs.

Full Access
Question # 59

A technician is attempting to set up a new laptop for a user. The user’s old laptop connects to the corporate wireless network “CompanyWiFi” automatically. However, when the technician looks for the “CompanyWiFi” network on the new laptop, he does not find it in the list of available networks. Both laptops have 802.11g wireless network adapters and are sitting next to each other on the user’s desk. Which of the following would MOST likely be the reason that the new laptop cannot see the “CompanyWiFi” network?

A.

Loss of signal strength

B.

Incorrect WEP key was input

C.

RFID interference from other electronic devices

D.

SSID broadcasting is disabled on the WAP

Full Access
Question # 60

Ann, a new user, is unable to communicate on the network from her computer. A technician has verified that the cables are functioning properly. Based on the information below, which action should the technician take to correct Ann’s problem?

Computer_ASwitch_A

IP: 10.0.0.60Int VLAN10

SM: 255.255.255.0IP address 10.0.0.1/28

GW: 10.0.0.1Speed 100 Duplex Full

A.

Change the duplex on the switch interface to half

B.

Change the speed on the switch interface to 10Mbps

C.

Change the subnet mask of the computer to 255.255.255.240

D.

Change the IP address of the computer to 10.0.0.12

Full Access
Question # 61

A user reports that some normally accessible external sites are not responding, but most other sites are responding normally. Which of the following is MOST likely the cause?

A.

VLAN tag mismatch

B.

Wrong subnet mask

C.

Smurf attack

D.

Faulty routing rule

Full Access
Question # 62

An administrator has set up a NIPS and connected it to the same switch as the internal firewall interface and the internal router. The device, however, only detects traffic from itself to the firewall or router. Which of the following explains why additional corporate traffic cannot be detected?

A.

The spanning tree protocol is preventing the traffic.

B.

Port Mirroring is set up incorrectly.

C.

The switch needs to be a layer 3 switch.

D.

The traffic is in a classless IP range and not classful IP range.

Full Access
Question # 63

A user cannot access the LAN after working successfully most of the day. Which of the following should the network administrator check FIRST?

A.

VLAN settings

B.

History logs

C.

Patch cable

D.

Port security

Full Access
Question # 64

A technician needs to install network device in a SOHO network. The office requires 9 wired workstations to share and print data. Which of the following can the technician use?

A.

A 12 port unmanaged switch.

B.

A wired router with an 8 port switch and a WAN port.

C.

A wireless router with an 8 port switch, and a WAN port.

D.

A 8 port firewall with one console port.

Full Access
Question # 65

The application layer in the TCP/IP model is comparable to which of the following layers in the OSI model?

A.

Layer 2

B.

Layer 5

C.

Layer 6

D.

Layer 7

Full Access
Question # 66

A network administrator notices that load balancing is not working properly on the web cluster as previously configured. In speaking with management, a change to the IP addressing scheme was made yesterday which possibly affected one member of the cluster. Due to the timing of the events, the administrator theorizes that this change caused the problem. Which of the following should the administrator do NEXT?

A.

Escalate to the management team

B.

Change the IP address back to its previous state

C.

Test the theory by analyzing logs

D.

Create a plan of action to present to management

Full Access
Question # 67

A newly hired technician is sent to an alternate site to complete the build out of large scale LAN. Which of the following tools should the technician have on hand to install the bulk CAT6 cable? (Select TWO).

A.

Loopback plug

B.

Multimeter

C.

OTDR

D.

Crimper

E.

Cable tester

F.

TDR

Full Access
Question # 68

A network administrator wants to balance the amount of data between two networking cards. Which of the following can be used for two or more networking cards?

A.

NIC bonding

B.

Proxy server

C.

Firewall ACLs

D.

VLANs

Full Access
Question # 69

A company is connected to an ISP, but owns the premise router with an internal CSU/DSU. Which of the following is considered the demarc?

A.

Premise router

B.

ISP router

C.

Smart jack

D.

CSU/DSU

Full Access
Question # 70

A company has a total of two public IP addresses and must allow 150 devices to connect to the Internet at the same time. Which of the following is the BEST option for connectivity?

A.

VLSM

B.

NAT

C.

CIDR

D.

PAT

Full Access
Question # 71

The company requires all users to authenticate to the network with a smart card, a pin number, and a fingerprint scan. Which of the following BEST describes the user authentication being used?

A.

Multi-factor authentication

B.

Two-factor authentication

C.

Biometrics

D.

Single sign-on

Full Access
Question # 72

Which of the following does Kerberos use to authenticate?

A.

Tickets

B.

Servers

C.

Users

D.

Clients

Full Access
Question # 73

In contrast to earlier Wi-Fi speeds, which of the following BEST describes the antenna and channelization properties used in 802.11n?

A.

MIMO, DSSS

B.

MIMO, OFDM

C.

CSMA, DSSS

D.

CSMA, CDMA

Full Access
Question # 74

A user moves from one office to another. When the user logs onto their computer, it has local access to shared drives but no Internet access. A technician determines that the computer has an IP address in the wrong subnet. Which of the following is MOST likely the cause?

A.

Incorrect VLAN

B.

MTU mismatch

C.

Hijacked HOSTS file

D.

Missing routes

Full Access
Question # 75

Some visitors are unable to access the wireless network. The network’s wireless infrastructure is comprised of three different buildings with the configurations listed below. Wireless network in Building A and C is used exclusively for internal employees and Building B is used for visitors and requires no additional configuration on their devices. Which of the following settings would need to be modified to provide wireless access to all visitors?

Building ABuilding BBuilding C

Channel: 2Channel: 6Channel: 11

Encryption: WPA2Encryption: WPA2Encryption: WPA2

A.

Encryption set to Open in all Buildings

B.

Encryption set to Open in Building B

C.

Encryption set to WEP in Building B

D.

Channel set to 11 in Building B

Full Access
Question # 76

A network technician is designing a SOHO environment where cost is a consideration. The requirements include access to the Internet and access to the guest house which is 100 feet away. The location of the Internet modem is located in the main house. Which of the following is the BEST option to accomplish these requirements?

A.

Use two combined Internet/router/wireless devices, one in each house.

B.

Use a Layer 3 switch in the main house and a combined Internet/router/wireless device in the guest house.

C.

Use a combined Internet/router/wireless device in the main house and a wireless access point in the guest house.

D.

Use a single combined Internet/router/wireless device at the guest house.

Full Access
Question # 77

A Linux-based workstation is unable to connect to an IP printer on the same network segment. The printer IP address settings have been verified. How would a network technician verify IP address settings on the Linux-based workstation?

A.

Run the dig command on the workstation.

B.

Run the nslookup command on the workstation.

C.

Run the ipconfig command on the workstation.

D.

Run the ifconfig command on the workstation.

Full Access
Question # 78

A user at a small business states that they cannot connect to the Internet via the company’s wireless network every time their cordless phone rings. Which of the following is MOST likely occurring?

A.

Interference

B.

Incorrect encryption type

C.

Latency

D.

SSID mismatch

Full Access
Question # 79

Which of the following can determine the last time an address lease was renewed on a network device?

A.

System log

B.

Packet sniffer

C.

Time domain reflectometer

D.

Stateful packet filter

Full Access
Question # 80

Due to a recent change in company policy, all users managing network infrastructure devices must use SSH v2 and all administrative activity must be collected on a central store. Which of the following should the network administrator deploy to comply with the new collection requirements?

A.

Network intrusion detection

B.

Traffic analysis tool

C.

Syslog server

D.

Network sniffer

Full Access
Question # 81

Which of the following tools would a technician use to terminate CAT6 wires to the inside of the wall jack?

A.

Toner probe

B.

Cable tester

C.

Punch down

D.

Crimper

Full Access
Question # 82

Which of the following is used to ensure traffic flows efficiently on multiple T-1 circuits?

A.

DNS server

B.

Content filter

C.

Proxy server

D.

Load balancer

Full Access
Question # 83

Hubs are differentiated from switches in that between the two, only hubs have:

A.

a single collision domain.

B.

a single broadcast domain.

C.

multiple collision domains.

D.

multiple broadcast domains.

Full Access
Question # 84

Which of the following protocols resolves IP addresses to MAC addresses?

A.

DNS

B.

ARP

C.

RARP

D.

NTP

Full Access
Question # 85

A technician has resolved a ticket to fix a user’s printer and has verified that the user is able to print with no issues. Which of the following action steps should the technician perform FIRST?

A.

Document findings and outcomes

B.

Establish a theory of probably cause

C.

Upgrade the printer drivers

D.

Close out the service ticket

Full Access
Question # 86

A network technician recently replaced a managed switch in an enterprise network with a new managed switch. Users on the switch can communicate with each other but now cannot access other network segments. Which of the following is the MOST likely reason that the users are unable to access any network segments?

A.

The newly installed switch is defective and must be returned.

B.

The newly installed switch is using a different MAC address than the previous switch.

C.

The technician forgot to change the VTP mode on the new switch to server.

D.

The technician did not use the correct cable when trunking the new switch.

Full Access
Question # 87

Which of the following protocols could the below packet capture be from?

Port: 161

msgVersion:

msgUsername:

msgAuthenticationParameters:

msgPrivacyParameters:

msgData:

data: get-request

request-iD.

error-status: noError (0)

error-index: 0

variable-bindings: 0 items

A.

SNMPv3

B.

SSH

C.

HTTP

D.

SNMPv1

Full Access
Question # 88

Assigning the same IP address to a network device is which of the following?

A.

SSID

B.

Scope

C.

Reservation

D.

Lease

Full Access
Question # 89

Ann, a new user, has a workstation that has connectivity to the printer located in her department, but cannot access the Internet. The result of an ipconfig command on Ann’s workstation is as follows:

IP address: 192.168.0.124

Subnet Mask: 255.255.255.128

Default Gateway: 192.168.0.254

Which is MOST likely preventing the user from accessing the Internet?

A.

Duplicate IP address

B.

Incorrect gateway

C.

Incorrect VLAN

D.

Bad switch port

Full Access
Question # 90

Which of the following network protocols is used to transport email between servers?

A.

IMAP4

B.

POP3

C.

SNMP

D.

SMTP

Full Access
Question # 91

Which of the following layers of the OSI model make up the Network Interface layer of the TCP/IP model? (Select TWO).

A.

Application

B.

Physical

C.

Presentation

D.

Transport

E.

Data Link

F.

Network

Full Access
Question # 92

Which of the following is the BEST network configuration to use if the technician wants to send all outgoing traffic to the external router?

A.

ACLs

B.

Static routing

C.

Trunking

D.

SNMP strings

Full Access
Question # 93

Which of the following protocols are used to view and send mail from a local host off of a remote server? (Select TWO).

A.

TFTP

B.

SNMP

C.

POP3

D.

IMAP4

E.

SFTP

Full Access
Question # 94

At which of the following layers of the OSI model do packets exist?

A.

Network

B.

Session

C.

Data Link

D.

Transport

Full Access
Question # 95

A network where all traffic feeds through a centralized gateway uses which of the following topologies?

A.

Peer-to-peer

B.

Ring

C.

Bus

D.

Star

Full Access
Question # 96

A MAC address is a part of which of the following OSI model layers?

A.

Network

B.

Data Link

C.

Physical

D.

Transport

Full Access
Question # 97

Which of the following layers of the OSI model is responsible for stripping the TCP port information before sending the packet up to the next layer?

A.

2

B.

3

C.

4

D.

5

Full Access
Question # 98

DHCP uses which of the following ports by default?

A.

21

B.

23

C.

68

D.

443

Full Access
Question # 99

Which of the following protocols is the BEST choice for retrieving email on multiple devices?

A.

IMAP4

B.

SMTP

C.

FTP

D.

SNMPv3

Full Access
Question # 100

Which of the following can a technician use when installing a wireless network in a lounge to prevent inappropriate website images?

A.

Content filter

B.

VPN concentrator

C.

Load balancer

D.

Proxy server

Full Access
Question # 101

Which of the following devices can be utilized to monitor and block websites accessible by a company?

A.

WINS server

B.

DNS server

C.

Content filter

D.

Reverse proxy

Full Access
Question # 102

A technician is having issues accessing the Internet from the workstation. They are able to ping the DNS server and their default gateway. Which of the following commands can be used to verify DNS is functioning properly?

A.

nslookup

B.

netstat

C.

traceroute

D.

nbtstat

Full Access
Question # 103

An administrator has set up several IPSec and SSL tunnels to terminate on a single device. Which of the following has the administrator deployed?

A.

Proxy Server

B.

Load Balancer

C.

VPN Concentrator

D.

Web-Application Firewall

Full Access
Question # 104

A network technician has been asked to look into a report from the IDS to determine why traffic is being sent from an internal FTP server to an external website. Which of the following tools can be used to inspect this traffic?

A.

Router firewall

B.

Ping and traceroute

C.

Throughput tester

D.

Protocol analyzer

Full Access
Question # 105

An administrator can use packet tags to configure which of the following?

A.

VLAN

B.

NAT

C.

PoE

D.

QoS

Full Access
Question # 106

An administrator would like to decrease the load time of common websites that employees review daily. Which of the following can be installed?

A.

Load balancing

B.

VPN concentrator

C.

Caching server

D.

Fault tolerance

Full Access
Question # 107

Users have reported choppy audio in phone conversations since the implementation of SIP phones on the network. Which of the following should be implemented to alleviate the delays?

A.

Caching

B.

VoIP

C.

QoS

D.

SMTP

Full Access
Question # 108

Which of the following devices is utilized to ensure traffic does not become congested while traveling over redundant links?

A.

Access control list

B.

Load balancer

C.

Content filter

D.

Proxy server

Full Access
Question # 109

A technician has traced a POTS line to a 110 block. Which of the following devices would the technician MOST likely use to see if the line carries a dial tone?

A.

Toner Probe

B.

Punch Down Tool

C.

Protocol Analyzer

D.

Butt Set

Full Access
Question # 110

A company has a server with redundant power supplies. Which of the following is this an example of?

A.

Traffic shaping

B.

Caching engines

C.

Fault tolerance

D.

Load balancing

Full Access
Question # 111

A technician decides to upgrade a router before leaving for vacation. While away, users begin to report slow performance. Which of the following practices allows other technicians to quickly return the network to normal speeds?

A.

Change management

B.

Baselines

C.

Asset management

D.

Cable management

Full Access
Question # 112

Which of the following switches is used with ARP to display the cache entry for a specific IP address?

A.

-a

B.

-d

C.

-g

D.

-s

Full Access
Question # 113

A client has just leased a new office space in a busy commercial building and would like to install a wireless network. Several other tenants are on the same floor. Multiple wireless networks are present in the building. Which of the following can be changed on the client’s wireless network to help ensure that interference from other wireless networks is at a minimum?

A.

WPA encryption key selection

B.

Channel selection

C.

Antenna types

D.

Disable SSID

Full Access
Question # 114

A network administrator suspects a broadcast storm is causing performance issues on the network. Which of the following would be used to verify this situation?

A.

Environmental monitor

B.

Multimeter

C.

Toner probe

D.

Protocol analyzer

Full Access
Question # 115

Ann, a user, connects to her company’s secured wireless network in the conference room when attending meetings. While using the conference room this morning, Ann notices an unsecured wireless network with the same name is available. Ann connects her laptop to this network instead of to the secured one. Ann has fallen victim to which of the following threats?

A.

Rogue access point

B.

ARP poisoning

C.

Replay attack

D.

Evil twin

Full Access
Question # 116

An administrator wants to restrict traffic to FTP sites regardless of which PC the request comes from. Which of the following would BEST accomplish this?

A.

An IP filtering ACL

B.

A MAC filtering ACL

C.

A port filtering ACL

D.

A class matching ACL

Full Access
Question # 117

A company has a remote access VPN and wants to ensure that if a username and password are compromised, the corporate network will remain secure. Which of the following will allow the company to achieve its security goal?

A.

Posture assessment

B.

Kerberos

C.

TACACS+

D.

Two-factor authentication

Full Access
Question # 118

The cost of installing fiber cable in a factory environment is too high. Which of the following cables should be used to minimize the effect of EMI?

A.

CAT6

B.

UTP

C.

Coaxial

D.

Crossover

Full Access
Question # 119

Which of the following is rated for speeds over 800Mbps?

A.

Coaxial

B.

DB-9

C.

CAT6

D.

CAT5e

Full Access
Question # 120

Which of the following cable types supports the FURTHEST distance when connecting various MDFs?

A.

Multimode

B.

UTP

C.

Singlemode

D.

CAT6

Full Access
Question # 121

Which of the following technologies is used on cellular networks?

A.

Ethernet

B.

CDMA

C.

CSMA/CA

D.

POTS

Full Access
Question # 122

Which of the following wiring components is used as a central point of termination for all network jacks through a building area?

A.

Demarc

B.

CSU

C.

Patch Panel

D.

Smart Jack

Full Access
Question # 123

Which of the following wireless technologies only uses the 5GHz spectrum but reaches a theoretical throughput of only 54Mbps?

A.

A

B.

B

C.

G

D.

N

Full Access
Question # 124

Which of the following network monitoring resources would be used to analyze possible connectivity issues such as duplex mismatches and uptime statistics?

A.

Protocol analyzer

B.

Syslog server

C.

Packet sniffer

D.

IPS logs

Full Access